Debian: New wine packages fix arbitrary code execution
Summary
- --------------------------------------------------------------------------Debian Security Advisory DSA 954-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff January 25th, 2006 http://www.debian.org/security/faq - --------------------------------------------------------------------------Package : wine Vulnerability : design flaw Problem-Type : local (remote) Debian-specific: no CVE ID : CVE-2006-0106 Debian Bug : 346197 H D Moore that discovered that Wine, a free implemention of the Microsoft Windows APIs, inherits a design flaw from the Windows GDI API, which may lead to the execution of code through GDI escape functions in WMF files. The old stable distribution (woody) does not seem to be affected by this problem. For the stable distribution (sarge) this problem has been fixed in version 0.0.20050310-1.2. For the unstable distribution (sid) this problem has been fixed in version 0.9.2-1. We recommend that you upgrade your wine packages. Upgrade Instructions - --------------------wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: Size/MD5 checksum: 1321 7955ea0c5382fb0bb4649e07ed82f973 Size/MD5 checksum: 47563 1973d7684bc3accf3c2eb1f4fa3b80be Size/MD5 checksum: 11798040 d90d31716ba71211af26ac773934f57e Architecture independent components: Size/MD5 checksum: 1780636 c78163bfadc872ca47b19c382f360bf2 Intel IA-32 architecture: Size/MD5 checksum: 8069792 90ae35746250507071ca6e8d43d9e647 Size/MD5 checksum: 1128766 38cee9eecc78832a9f8e83385f599d0f Size/MD5 checksum: 1105648 626dbf5ed914d7dfd080a826b275ebf6 Size/MD5 checksum: 1094760 10c2c64aee60e0473c61f07de3e772f9 Size/MD5 checksum: 2530646 7d1bc36dbb1dfa57d816ba24e135eadd Size/MD5 checksum: 1107820 77e61796adc46f530219502b37e0a86c Size/MD5 checksum: 1102382 af5ef1acdceb8ea0863abd3e6041c825 Size/MD5 checksum: 1202416 e504f2d0cdd5f5f0187b0c44abbfdcae Size/MD5 checksum: 1104750 4edd3e88a7ae7f4e0dc9a42d127a1de2 Size/MD5 checksum: 1299408 dbf86414fc89653b4d910d282733e09b Size/MD5 checksum: 1659130 7ba1ce62ec17663f390d8b1ea2b45d63 These files will probably be moved into the stable distribution on its next update. - ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org